Preferred Language
Articles
/
bsj-8361
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The History of Multi Parties and its Effect on Political System in India
...Show More Authors

The History of Multi Parties and its Effect on Political System in India

View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The Origins of Chinese Influence on Pottery in the Tang and Song Dynasties
...Show More Authors

This research study of influence of Chinese thought on porcelain in the tang and song period, the study came into four sections, which are:
* First section contains general framework of the research, which include the problem, which is represented by following of questions:
1- Is there intellectual and ideological dimensions in Chinese porcelain?
2-What are the mechanisms and techniques of Chinese porcelain?
.the importance of this research and the need counted as a study providing cognitive addition into the Chinese arts field, especially ceramics of the Chinese. The aim of the research included of areas of artistic creativity in Chinese pottery and ceramics according to the bases of construction and composition. As the impo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 05 2014
Journal Name
Journal Of Educational And Psychological Researches
The educational violence and it's reflections on study attainment of the primary stage pupils
...Show More Authors

Chapter-1

Problem of the research: 

The studies and researches have noticed the aggravation of violence practice in all educational means using different and innovated styles against children in the school and house in order to upbringing by the parents or the school .

It is a training method for the person to participate in the society and prepare him to be an effective member.

The current research confines the children in age (6-12) years old representing the primary stage who face different kind of violence during the familiar or school education.

The current research aims to:

1 – The kinds of violence which happens to the children in the primary

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
The political and economic repercussions of the Chinese Marshall Plan on the Arab world
...Show More Authors

China is moving towards building the largest economic power in the world, so what does this mean economically and politically for Europe, America, the Middle East and the Arab world? This project is called the expansionist Chinese Marshall Plan which is a revival of the old Silk Road in a new way. It represents the aspirations of the Chinese people and their president, Xi Jinping, to build a transport route from Asia to Europe and a railway plan to transport goods. The purpose of this is to develop the economic growth model, expand into new markets, promote the Chinese currency, and expand economic and political influence in the areas covered by the Chinese initiative. Equal opportunities in distributing investments to these countries, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Estimation of reservoir properties based on core plugs, lithofacies, and well logs for Nahr Umr Formation in Noor oilfield, southern Iraq
...Show More Authors

The Nahr Umr Formation, one of the most important Cretaceous formations and one of the main generating reservoirs in southern Iraq and neighboring regions, was chosen to study and estimate its petrophysical properties using core plugs, lithofacies, and well logs from five wells in the Noor oilfield. Reservoir properties and facies analyses are used to divide the Nahr Umr formation into two-member (limestone in the upper part and main sandstone in the lower). Limestone members are characterized by low reservoir properties related to low effective porosity and permeability while the main sandstone member is considered as a reservoir. Four lithofacies were recognized in the main sandstone member of the Nahr Umr Formation according to petrog

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
The Effect of the Natural and Cultural Environments Factors on the Architectural and Planning Characteristics of Sulaymaniyah Mosques
...Show More Authors

Most of the mosques in the Islamic world fall under specific and known forms and patterns to a large extent, and such patterns have grown and evolved from the few basic and uniform models, but they changed slowly due to the impact with a mixture of changing functional requirements and cultural landscapes because of the variables of time and place to form patterns known and famous in this day across parts of the Islamic world and its borders. There was no exception to these patterns, but small numbers of mosques that were probably the result of personal experiences or improvisational resolutions, or in response to specific or temporary stimuli. However, the emergence of a specific pattern which does not belong to any of these patt

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Journal Of The College Of Basic Education
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref